tandasat / HelloIommuPkgLinks
The sample DXE runtime driver demonstrating how to program DMA remapping.
☆70Updated last year
Alternatives and similar repositories for HelloIommuPkg
Users that are interested in HelloIommuPkg are comparing it to the libraries listed below
Sorting:
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆33Updated 4 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆108Updated 4 years ago
- Parser for Microsoft Program Database (PDB) files☆77Updated 5 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆98Updated 5 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Updated 2 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆102Updated 2 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆85Updated 10 years ago
- ☆68Updated 4 years ago
- IntroVirt is an guest introspection library for KVM☆57Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- A native hypervisor designed for the Windows operating system☆123Updated 4 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆104Updated 4 years ago
- ☆98Updated 8 years ago
- VT-based PCI device monitor (SPI)☆152Updated 5 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- VTIL command line utility☆27Updated 3 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆18Updated 3 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆43Updated last month
- Open Course for diving security internal☆51Updated 6 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆110Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- AMD SVM hypervisor rootkit proof of concept☆48Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆115Updated 9 years ago
- ☆51Updated 4 years ago
- Pretty x86 instruction reference site generator☆61Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆78Updated 14 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆79Updated 3 years ago